Misplaced Pages

Brute force attack: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactivelyNext edit →Content deleted Content addedVisualWikitext
Revision as of 15:55, 17 September 2004 editCompulsion (talk | contribs)57 editsNo edit summary  Revision as of 16:00, 17 September 2004 edit undoCompulsion (talk | contribs)57 editsNo edit summaryNext edit →
Line 1: Line 1:
'''Brute-force attack''' is a relatively simple method of determining the key of an encrypted message. A Brute-Force attack is a similar to a ], and shares many of the characteristics. '''Brute-force attack''' is a method of determining the key of an encrypted message. While simple to implement, it is a ] method of attack. A Brute-Force attack is similar to a ].


Usually, a series of ] are generated via an ] or from a predetermined list (usually referred to as a ]). Keys are applied to the message to produce ]. Each passage of ] must be ] to determine if it is the desired message. Usually, a series of ] are generated via an ] or from a predetermined list (usually referred to as a ]). Keys are applied to the message to produce ]. Each passage of ] must be ] to determine if it is the desired message.

Revision as of 16:00, 17 September 2004

Brute-force attack is a method of determining the key of an encrypted message. While simple to implement, it is a computationally expensive method of attack. A Brute-Force attack is similar to a Brute-force search.

Usually, a series of keys are generated via an algorithm or from a predetermined list (usually referred to as a dictionary). Keys are applied to the message to produce plain text. Each passage of plain text must be verified to determine if it is the desired message.

This is an extremely time-consuming task. Cracking a message with a relatively miniscule 6-digit alphanumeric key has 62 6 {\displaystyle 62^{6}} possible solutions, each of which must be run through a verfication process.

The benefit of a Brute-Force attack is that, eventually, the correct key will be produced.

Specifics of Brute-force methods can be found at Brute-force search.